Which technique uses voice technology such as the telephone system or VoIP to obtain personal or financial information?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique uses voice technology such as the telephone system or VoIP to obtain personal or financial information?

Explanation:
Vishing is a form of social engineering that uses voice channels—phone calls or VoIP—to trick people into revealing personal or financial information. Attackers pose as banks, tech support, or other trusted entities, create a sense of urgency, and ask for sensitive data such as account numbers, PINs, passwords, or one-time codes. The key here is the method: the manipulation happens through voice communication, not through email or physical access. This makes it the best fit because the scenario specifically describes using telephone systems to obtain information, whereas the other options involve different attack vectors—physical entry, romantic or social manipulation, or redirecting funds—without relying on voice-based information disclosure. To defend against vishing, verify identities through independent channels, avoid sharing sensitive data over the phone, and rely on official contact methods rather than caller-provided information.

Vishing is a form of social engineering that uses voice channels—phone calls or VoIP—to trick people into revealing personal or financial information. Attackers pose as banks, tech support, or other trusted entities, create a sense of urgency, and ask for sensitive data such as account numbers, PINs, passwords, or one-time codes. The key here is the method: the manipulation happens through voice communication, not through email or physical access.

This makes it the best fit because the scenario specifically describes using telephone systems to obtain information, whereas the other options involve different attack vectors—physical entry, romantic or social manipulation, or redirecting funds—without relying on voice-based information disclosure. To defend against vishing, verify identities through independent channels, avoid sharing sensitive data over the phone, and rely on official contact methods rather than caller-provided information.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy